Thursday, December 1, 2022

Bulk or Marketing Email Tools // cloud bulk mail solutions


Marketing Mail or Bulk Email Solutions


1) AWS SES : 

Amazon Simple Email Service (SES) lets you reach customers confidently without an on-premises Simple Mail Transfer Protocol (SMTP) system.

Amazon SES is a cloud email service provider that can integrate into any application for bulk email sending. Whether you send transactional or marketing emails, you pay only for what you use. Amazon SES also supports a variety of deployments including dedicated, shared, or owned IP addresses. Reports on sender statistics and a deliverability dashboard help businesses make every email count.

2) Sendgrid:

SendGrid delivers your transactional and marketing emails through the world's largest cloud-based email delivery platform. Send with confidence. 

SendGrid (also known as Twilio SendGrid) is a Denver, Colorado-based customer communication platform for transactional and marketing email.

3) Mailgun : 

Managed email delivery for high-volume senders

Sending millions of emails a month requires an extra level of diligence to achieve and maintain optimal deliverability and performance. Our experts help you get more emails delivered, with a strategy customized to your needs.

4) Mailchimp: 

5) Sendinblue 

Tuesday, November 22, 2022

Security Command Center of GCP



Security Command Center is Google Cloud's centralized vulnerability and threat reporting service. Security Command Center helps you strengthen your security posture by evaluating your security and data attack surface; providing asset inventory and discovery; identifying misconfigurations, vulnerabilities and threats; and helping you mitigate and remediate risks

To use Security Command Center, you must have an Identity and Access Management (IAM) role that includes appropriate permissions:

  • Security Center Admin Viewer lets you view Security Command Center.
  • Security Center Admin Editor lets you view Security Command Center and make changes.

The Threats dashboard helps you review potentially harmful events in your organization's Google Cloud resources.

  • Threats by severity shows the number of threats in each severity level.
  • Threats by category shows the number of findings in each category across all projects.
  • Threats by resource shows the number of findings for each resource in your organization.

The threats dashboard displays results for the time period you specify in the drop-down list. The drop-down list has several options between 1 hour and "all time," which shows all findings since the service was activated. The time period you select is saved between sessions.

Scan with SCC and store logs will store in Cloud storage ->

** Security Health Analytics scans run in three modes:

Batch scan: All detectors are scheduled to run for all enrolled organizations two or more times a day. Detectors run on different schedules to meet specific service level objectives (SLO). To meet 12- and 24-hour SLOs, detectors run batch scans every six hours or 12 hours, respectively. Resource and policy changes that occur in between batch scans are not immediately captured and are applied in the next batch scan. Note: Batch scan schedules are performance objectives, not service guarantees.

Real-time scan: Supported detectors start scans whenever CAI reports a change in an asset's configuration. Findings are immediately written to Security Command Center.

Mixed-mode: Some detectors that support real-time scans might not detect changes in real time in all supported assets. In those cases, configuration changes for some assets are captured immediately and others are captured in batch scans. Exceptions are noted in the tables on this page.

Route GWS MAILBOXes from On prem postfix mail server // Hybrid Google GWS Solution

Edit transport file.

vi /etc/postfix/transport


########### GWS MAIL Boxes ##############

#########################################   smtp:[]:25          smtp:[]

postmap /etc/postfix/transport

From GWS admin panel use Route and also Default route for the incoming route

Check USB Port Speed from Linux Server


#Check USB Port Speed from Linux Server: 

 cat /sys/bus/usb/devices/usbX/speed

Here X will be 1 or 2 or 3 , usb1 or usb2 or usb3 

if  give you the bus speed of the root hub(s) in Mbps: 

either 1.5, 12, indicate USB1 (low speed or full speed)

either 480, indicate USB2

either 5000 or 10000, indicate USB3

#Create specific size file and check read write speed in linux

dd if=/dev/zero of=test bs=1G count=1

this will carete a 1Gb file name will be test

Tuesday, November 15, 2022

How to mount a Google Cloud Bucket in Linux using gcsfuse



Mounting a Google Cloud Storage bucket into CentOS/Debian


So here are the steps;

Create a GCP Cloud Storage bucket

Add a service account to which has access to that bucket

Install GCSFuse (The software that actually does the job) on the server

Prepare to mount (like we were doing bungee jumping up-to this point)

[Optional] Configure HTTP proxy settings

Mount the bucket


key.json create

enable api

from the top area click the Create Service Account button.

Add a unique name, and press Create

In the grant service account access step, select Cloud Storage > Storage Object Admin

Goto Console-> IAM -> service account -> create Service account -> (... Actions) -> Manage Key -> create json file ->

upload this key.json file to linux instance

gcsfuse --key-file /home/khan/stl-td2e879f.json --foreground /bucketdata



Mount in a Ubuntu instance


** Install gcsfuse

Enter the following commands one by one

sudo apt-get update

sudo apt-get install curl -y

export GCSFUSE_REPO=gcsfuse-`lsb_release -c -s`

echo "deb $GCSFUSE_REPO main" | sudo tee /etc/apt/sources.list.d/gcsfuse.list

curl | sudo apt-key add -

sudo apt-get update

sudo apt-get install gcsfuse

As of now, you should have gcsfuse installed and ready for action. But we will need google-cloud-sdk for authenticating to the Google Storage

** Install Google Cloud SDK

export CLOUD_SDK_REPO="cloud-sdk-$(lsb_release -c -s)"

echo "deb $CLOUD_SDK_REPO main" | sudo tee -a /etc/apt/sources.list.d/google-cloud-sdk.list

curl | sudo apt-key add -

sudo apt-get update && sudo apt-get install google-cloud-sdk

Authenticate with Google Cloud Storage

Switch to the user you will be mounting your bucket with. And issue the following command

gcloud auth application-default login

This will present you with a URL. Copy that URL and paste it in your browser, login with your Google account. You should see a token on your browser window. Copy it and paste it in the Terminal prompt asking for the verification code.

Once you give the token, you should be authenticated and you can now mount your Bucket.

Mount the bucket

Again, switch to the user you want to mount the bucket as. This is important because you cannot change the ownership of the mount. If you mount it with root user, then the mount can only be used by the root user.

mkdir /mnt/google-cloud-bucket

gcsfuse your_bucket_name /mnt/google-cloud-bucket

That’s it, you should have your bucket mounted on your system. You can verify the mount using the df -h command


Linux Users command save in a log file

 If you want to keep a trace all Linux user commands in a log file, 

Follow below-mentioned steps:

1)** Edit /etc/rsyslog.d/bash.conf

vi /etc/rsyslog.d/bash.conf

and add the following: 

local6.*    /var/log/commands.log

2)** Open /root/.bashrc:

sudo -e /etc/bashrc

and add this line:

export PROMPT_COMMAND='RETRN_VAL=$?;logger -p local6.debug "$(whoami) [$$]: $(history 1 | sed "s/^[ ]*[0-9]\+[ ]*//" )"'

Run the following to load the changes:

source /etc/bashrc

3)** Edit /etc/logrotate.d/syslog:

sudo -e /etc/logrotate.d/syslog

and add the following line:


4)** Restart rsyslog service:

sudo service rsyslog restart 

5)** With the above, the logs are saved in /var/log/commands.log in the following format:

Enjoy.... @taybkhan@

tail -f /var/log/commands.log

Thursday, June 9, 2022

How to get started with GCP ?

Anyone can start building on Google Cloud with $300 in free credits for 90 days and free usage of 

20+ products like Compute Engine and Cloud Storage, up to monthly limits.

Visit:    for details

Signup form is here to use $300 

Cloud Security

 Why Cloud Security ??

Cloud security, also known as cloud computing security, is a collection of security measures designed to protect cloud-based infrastructure, applications, and data. These measures ensure user and device authentication, data and resource access control, and data privacy protection. They also support regulatory data compliance. Cloud security is employed in cloud environments to protect a company's data from distributed denial of service (DDoS) attacks, malware, hackers, and unauthorized user access or use.

Cloud security is critical since most organizations are already using cloud computing in one form or another. This high rate of adoption of public cloud services is reflected in Gartner’s recent prediction that the worldwide market for public cloud services will grow by 23.1% in 2021.

Security in cloud computing is crucial to any company looking to keep its applications and data protected from bad actors.